NSEs – Telegram
NSEs
1.14K subscribers
109 photos
15 videos
58 files
178 links
Where Network meets Red Team 🎯
If you're into PenTesting, Hacking, and Cyber Shenanigans — you're home!
🧠 Learn • 🚀 Hack • 🧩 Quiz • 📚 Books • 😁 Memes
Download Telegram
20 Chrome Extensions for Bug Hunter

CHANNEL
GROUP
DISCORD
13🔥1
This media is not supported in your browser
VIEW IN TELEGRAM
👍8
This media is not supported in your browser
VIEW IN TELEGRAM
👍7
This media is not supported in your browser
VIEW IN TELEGRAM
👍8
This media is not supported in your browser
VIEW IN TELEGRAM
💯8
Forwarded from Code Review
اگر میخواین به Bug Bounty به عنوان یک کار تمام وقت نگاه کنین ، حتما این راهنمای فوق‌العاده‌ی Rhynorater رو بخونین.
دوتا نسخه اینجا هست که یکیش انگلیسی و اصلی هست و برای سادگی کار یه نسخه فارسی هم ترجمه کردم.
🔥12
This media is not supported in your browser
VIEW IN TELEGRAM
8
Forwarded from GO-TO CVE
🌙 شب‌های آموزشی باگ بانتی – فقط توی دیسکورد GoToCve!

🕚 هر شب از ساعت ۱۱ شب تا ۱ بامداد، همراه ما باش تو دیسکورد!

📚مباحث مختلف رو با هم پیش میریم و مهم تر از همه :

با هم می‌ریم سراغ مطالب کاربردی و مهم از OWASP Cheat Sheet Series

🧠 می‌خونیم، توضیح می‌دیم، تست می‌کنیم!

چی یاد می‌گیری؟
🔐 مباحث امنیت
🕵️‍♂️ تست نفوذ
🛠️ راهکارهای عملی

و هر چیزی که یه باگ‌بانتر واقعی باید بدونه!

کِی؟
هر شب (به جز جمعه و شنبه) – از ساعت ۱۱ تا ۱

🌐 کجا؟
توی دیسکورد گروه باگ‌بانتی:
👉 https://discord.gg/9pcB5TD9

💬 توی تلگرام هم عضو باش رفیق!
👉 https://news.1rj.ru/str/gotocvejustchat


ویژه:
📝 یه تاپیک مخصوص خلاصه‌ها و نکات هر جلسه داریم
به‌روز بمون، یاد بگیر، و با بقیه حرفه‌ای‌ها شبکه بساز!

منتظرتیم!
🚀
This media is not supported in your browser
VIEW IN TELEGRAM
🐳5
#FUN😁

CHANNEL  
GROUP
DISCORD
🤣10👍1😁1
This media is not supported in your browser
VIEW IN TELEGRAM
🚨 EVIL TWIN ATTACK — FULL BREAKDOWN FOR BEGINNERS
🎓 Learn how fake Wi-Fi networks can silently steal your data


🔹 01 — WHAT IS AN EVIL TWIN ATTACK?

An Evil Twin Attack is a cyber attack where a hacker creates a fake Wi-Fi hotspot that mimics a legitimate one (like at a café, airport, or library).

Once a victim connects, the attacker can:

Monitor all online activity

Intercept sensitive data (passwords, messages, banking info)

Redirect to fake login pages (phishing)

🧠 It’s like putting on a disguise and listening to someone’s private conversation.


🔹 02 — HOW DOES IT WORK STEP-BY-STEP?

👤 Hacker sets up a Rogue Access Point

📶 Names it just like a real Wi-Fi (e.g., “Airport_Free_WiFi”)

📲 Victim connects without knowing

🕵️‍♂️ Hacker captures everything using packet sniffers or man-in-the-middle (MITM) tools

🔁 Hacker may redirect user to a fake website asking for login credentials

📌 It’s not just about spying — some Evil Twin attacks actively trick you into typing your credentials into fake websites.


🔹 03 — REAL-LIFE EXAMPLE

You're at Starbucks. You see two networks:

Starbucks_WiFi

Starbucks_WiFi_Free

You choose the second one. It connects, seems fine…
But it’s the hacker’s network.
They now have access to:

Your Instagram password
Your Gmail session
Possibly your bank login (if you don’t use HTTPS or a VPN)

📎 This happens fast and silently. You may never even know.



🔹 04 — TOOLS HACKERS USE

🔧 Here are tools used in real Evil Twin Attacks:

Airbase-ng: Creates fake APs

Fluxion: Combines Evil Twin + phishing attacks

Wireshark: Sniffs traffic and captures packets

Karma Attack: Auto-responds to devices looking for known networks

Bettercap: Powerful MITM tool that can hijack sessions

⚠️ These tools are open-source — free and legal to download. That’s why awareness is critical.


🔹 05 — WARNING SIGNS OF A FAKE WI-FI

Be suspicious if:

🚩 You see multiple networks with the same or similar name
🚩 The Wi-Fi asks for login before connecting to the internet
🚩 Internet works slowly or randomly disconnects
🚩 You get a browser warning about invalid certificates
🚩 You’re redirected to a weird-looking login page

🔍 If the network asks you to “log in” before browsing, be extra cautious — especially if it’s a public place.


🔹 06 — HOW TO PROTECT YOURSELF

Never access banking or personal accounts on public Wi-Fi
Use a VPN to encrypt your traffic
Turn off auto-connect to open networks
Use HTTPS Everywhere (browser extension)
Ask the staff for the official Wi-Fi name
Use 2FA — even if they get your password, they can’t log in
On phone? Use mobile data for sensitive actions

💡 Bonus Tip: On Android, disable “Wi-Fi scanning” in location settings to stop devices from auto-broadcasting known networks.


🔹 07 — DISCLAIMER

⚠️ This guide is for educational purposes only.
We do not support or promote illegal hacking.

Our goal is to raise cyber awareness and help build a safer internet


CHANNEL  
GROUP
DISCORD
👏111
This media is not supported in your browser
VIEW IN TELEGRAM
🔥8
📖 Metasploit 2nd Edition:The Penetration Tester’s Guide

CHANNEL  
GROUP
DISCORD
7